IoT Module 2
IoT Module 2
UNIVERSITY
DEPARTMENT OF COMPUTER
APPLICATIONS
INTERNET OF THINGS(IOT)-22CA2409
▪ It is known for its low power consumption, extended battery life, mesh
networking capabilities, and cost-effectiveness.
BASIC ARCHITECTURE AND NETWORK
TOPOLOGY
▪ The IEEE 802.15.4 technology's basic architecture consists of three layers, including
the physical layer, media access control (MAC) layer, and networking layer.
▪ Mesh and star network topologies are used to connect devices.
▪ Mesh topology enables direct communication between devices without the need for a
central hub or node.
▪ star topology has all devices communicate with a central node.
▪ The technology offers versatile options for designing networks based on specific
requirements and constraints of various applications
1.Zigbee's mesh networking and low power consumption make it ideal for
connecting and controlling numerous lights in a home or building, creating a reliable
and energy-efficient lighting system.
2. Zigbee can connect various sensors in farms, such as soil moisture sensors,
temperature sensors, and humidity sensors. This allows for remote monitoring and
control of irrigation systems, optimizing resource usage and improving crop yields.
BLUETOOTH
Bluetooth protocol is a wireless technology standard for exchanging data over
short distances (typically less than 10 meters), using short-wavelength UHF radio
waves in the industrial, scientific, and medical radio bands, from 2.400 to 2.485
GHz.
▪ It was developed to support simple wireless communication between telephones,
computers, and other devices, and has evolved to support a wide range of devices
and use cases, such as wireless audio and music streaming.
• Bluetooth is a wireless technology standard IEEE 802.15.
• Bluetooth was developed as a way to exchange data over a short range without
the need for wires and for short-range (no more than 100 meters)
communication.
• It is in a star configuration, with a single primary device that controls several
secondary devices.
• Bluetooth operates across both layers 1 (PHY) and 2 (MAC) of the OSI model.
BLUETOOTH LOW ENERGY(BLE)
Bluetooth Low Energy (BLE) is a wireless communication protocol commonly used in IoT (Internet of Things)
applications due to its low power consumption, cost-effectiveness, and suitability for short-range
communication.
1. Low Power Consumption: BLE is optimized for low-power applications, making it ideal for
battery-operated IoT devices. It allows devices to operate for extended periods without frequent battery
replacements or recharging, which is essential for IoT deployments in remote or energy-constrained
environments.
2. Short Range Communication: BLE provides short-range communication typically within a range of up to
10-100 meters. This range limitation is suitable for IoT applications where devices need to communicate
with nearby smartphones, gateways, or other BLE-enabled devices in proximity.
3. Wireless Connectivity: BLE enables wireless connectivity between IoT devices and other BLE-enabled
devices such as smartphones, tablets, and IoT gateways. This connectivity allows IoT devices to exchange
data, receive commands, and communicate with central control systems or cloud platforms.
4. Efficient Data Transfer: BLE supports efficient data transfer with low data rates, making it suitable for
transmitting small packets of data such as sensor readings, status updates, or control commands. It
employs adaptive frequency hopping and efficient packet structures to minimize energy consumption
during data transmission.
5. Profile-based Architecture: BLE uses a profile-based architecture to define specific communication
behaviors and capabilities for different types of devices and applications. Common BLE profiles include the
Generic Attribute Profile (GATT), which defines how data is organized and exchanged between devices,
and the Generic Access Profile (GAP), which manages device discovery, connection establishment, and
security.
6. Security: BLE provides built-in security features to protect data transmission and prevent unauthorized
Application of BLE protocol:
1.BLE's low power consumption is perfect for devices that need to run for extended periods
on a small battery, like fitness trackers that monitor your steps, heart rate, and sleep.
2. BLE tags can be attached to valuable assets, such as medical equipment in a hospital or
tools in a construction site, to track their location and prevent loss or theft.
WI-FI
Wi-Fi (Wireless Fidelity) is a commonly used wireless communication technology in IoT (Internet of Things)
applications due to its widespread availability, high data rates, and compatibility with existing networking
infrastructure. Here's how Wi-Fi works in IoT:
1. High-Speed Connectivity: Wi-Fi offers high-speed data transmission, making it suitable for IoT devices
that require fast and reliable communication. It enables IoT devices to connect to local networks, the
internet, and other Wi-Fi-enabled devices such as smartphones, tablets, and computers.
2. Wireless Access Points (APs): Wi-Fi networks typically consist of one or more wireless access points
(APs) that provide wireless connectivity to devices within their coverage area. APs are connected to wired
networks and act as gateways for IoT devices to access network resources and services.
3. Infrastructure Mode: In infrastructure mode, IoT devices connect to Wi-Fi networks through APs. Each
AP is typically connected to a wired network, such as a router or switch, allowing devices to communicate
with each other and access external resources like internet services or cloud platforms.
4. Security: Wi-Fi networks support various security protocols, such as WPA2 (Wi-Fi Protected Access 2) or
WPA3, to encrypt data transmissions and protect against unauthorized access. Additional security
features like device authentication, secure bootstrapping, and data encryption may also be implemented
to ensure the confidentiality and integrity of IoT communications.
5. 802.11 Standards: Wi-Fi for IoT devices typically adheres to standard Wi-Fi protocols such as IEEE
802.11a/b/g/n/ac/ax. These standards define specifications for wireless communication, including data
rates, modulation techniques, channel access mechanisms, and security protocols.
6. Range and Coverage: Wi-Fi networks offer extended coverage areas, allowing IoT devices to
communicate over relatively long distances, typically within a range of up to several hundred meters.
This range flexibility is suitable for applications where devices need to communicate over larger areas or
across multiple floors within a building.
Application of WIFI :
1.Wi-Fi's high bandwidth allows for the streaming of high-quality video from security
cameras to a monitoring device or cloud storage, ensuring clear footage for
surveillance.
2.Modern cars use Wi-Fi to connect to the internet for navigation, entertainment, and
over-the-air software updates.
LOWPAN
Low-power Wireless Personal Area Network (LoWPAN) is a network protocol designed specifically for
connecting low-power, low-data-rate IoT (Internet of Things) devices over short distances. Here's how
LoWPAN works in IoT:
1. Low Power Consumption: LoWPAN is optimized for IoT devices that operate on limited power
sources, such as batteries or energy harvesting systems. It employs power-saving techniques to
ensure long battery life and minimize energy consumption, making it suitable for deployments in
remote or resource-constrained environments.
2. Short Range Communication: LoWPAN typically operates over short distances, covering areas
ranging from a few meters to a few kilometers. This limited range is suitable for applications where
devices need to communicate within a localized area, such as smart homes, industrial facilities, or
agricultural fields.
3. Wireless Connectivity: LoWPAN provides wireless connectivity for IoT devices using various radio
frequency (RF) technologies, including IEEE 802.15.4, Bluetooth Low Energy (BLE), or proprietary
protocols. These wireless technologies enable devices to communicate with each other directly or
through intermediate devices like routers or gateways.
4. Mesh Networking: LoWPAN supports mesh networking, where IoT devices form self-organizing
networks to relay data packets between nodes. This decentralized architecture improves network
reliability, scalability, and coverage by allowing devices to communicate through multiple hops, even
in the presence of obstacles or signal interference.
5. IPv6 Support: LoWPAN uses IPv6 (Internet Protocol version 6) to assign unique addresses to IoT
devices and enable seamless integration with the internet. IPv6 addressing allows IoT devices to
communicate directly with internet services and cloud platforms, enabling remote monitoring,
management, and data analysis.
6. Application Support: LoWPAN supports various IoT applications and use cases, including smart
home automation, industrial monitoring and control, environmental sensing, healthcare monitoring,
and asset tracking. Its low-power, short-range capabilities make it suitable for a wide range of
deployments requiring wireless connectivity for IoT devices.
COAP
CoAP (Constrained Application Protocol) plays a crucial role in facilitating efficient communication between
constrained devices over constrained networks. Here's how CoAP is used in IoT:
1. Lightweight Protocol: CoAP is designed to be lightweight and efficient, making it well-suited for IoT
devices with limited resources such as memory, processing power, and battery life. Its simplicity reduces
overhead and energy consumption, making it ideal for IoT deployments.
2. RESTful Communication: CoAP follows the principles of REST (Representational State Transfer),
allowing IoT devices to interact with resources using familiar HTTP-like methods such as GET, POST, PUT,
and DELETE. This simplifies application development and integration, as developers can leverage existing
web technologies and practices.
3. UDP-based Communication: CoAP operates over the User Datagram Protocol (UDP), which is
lightweight and connectionless. UDP's simplicity reduces the overhead associated with connection setup
and teardown, making CoAP suitable for communication in low-power and lossy networks commonly found
in IoT deployments.
4. Resource-Oriented Architecture: CoAP organizes resources on IoT devices in a hierarchical manner,
similar to the web's URI (Uniform Resource Identifier) scheme. Each resource is identified by a unique URI,
allowing clients to interact with them using CoAP messages. This resource-oriented approach simplifies
device management and enables seamless integration with web-based services.
5. Observing Resources: CoAP supports the concept of observing resources, allowing clients to subscribe
to notifications for changes in resource state. This enables efficient event-driven communication between
IoT devices, reducing the need for continuous polling and conserving energy.
6. Interoperability and Integration: CoAP promotes interoperability between heterogeneous IoT devices and
networks, enabling seamless communication and integration across different vendors and technologies. It
provides a standardized protocol for exchanging data and commands, fostering collaboration and
innovation in the IoT ecosystem.
7. Security: CoAP includes built-in security features such as Datagram Transport Layer Security (DTLS) to
ensure the confidentiality, integrity, and authenticity of data exchanged between devices. This protects
against eavesdropping, tampering, and unauthorized access, ensuring the security of IoT communications.
Architecture Overview
CoAP Environment:
1. The architecture operates within a CoAP-based network where CoAP clients, servers, and IoT devices communicate efficiently.
2. CoAP Clients:
1. These are devices (such as smartphones or embedded systems) that send requests to CoAP servers to retrieve or control IoT
resources.
2. Example: A mobile app requesting temperature data from a sensor.
3. CoAP Server:
1. The CoAP server is responsible for handling requests from clients and responding with the required data.
2. It can control IoT devices like sensors, alarms, or smart home systems.
3. Example: A temperature sensor acting as a CoAP server, responding to client requests with real-time temperature data.
Publish-Subscribe Model: This model involves multiple clients interacting with each other, without having
any direct connection established between them. All clients communicate with other clients only via a third
party known as a Broker.
WORKING OF MQTT
Publishing: A client (e.g., a sensor) publishes a message to a specific topic.
The message contains the data (e.g., the temperature reading).
Broker Routing: The broker receives the message and checks the topic.
It then forwards the message to all clients that have subscribed to that topic (or a matching wildcard
topic).
Subscribing: Clients (e.g., a monitoring application) subscribe to topics they're interested in .They
don't need to know who is publishing the data; they just subscribe to the topic.
Imagine a smart home with multiple sensors (temperature, light, motion) and actuators (lights,
thermostat).
•Each sensor acts as an MQTT client and publishes data to specific topics (e.g., /home/temperature,
/home/light).
•The smart home hub acts as an MQTT broker, receiving and routing messages.
•A mobile app acts as an MQTT client, subscribing to relevant topics to display sensor data and
•send commands to actuators (e.g., turn on/off lights).
KEY ARCHITECTURAL
FEATURES:
• Lightweight: MQTT messages are small and efficient, minimizing bandwidth
usage.
• Asynchronous: Publishers and subscribers don't need to communicate directly.
The broker handles message routing.
• Decoupled: Publishers and subscribers are independent of each other. This allows
for flexible and scalable systems.
• Flexible Messaging: Topics provide a flexible way to organize and filter
messages. Wildcard topics allow for subscribing to multiple topics at once.
• Quality of Service (QoS): MQTT defines different QoS levels to ensure message
delivery reliability (at most once, at least once, exactly once).
Example:
A vending machine automatically reporting its inventory levels to a central server.
IoT M2M
Internet of Things Machine to Machine
Data is shared between other applications that Data is shared with only the communicating
are used to improve the end-user experience. parties.
A large number of devices yet scope is large. Limited Scope for devices.
SILIMARITIES OF M2M and IoT
1.Data Exchange:
Both IoT and M2M involve the exchange of data between devices or machines, enabling them to gather information, make
decisions, and respond to changes in their environment.
2. Connectivity:
Both IoT and M2M rely on various connectivity options, such as cellular networks, Wi-Fi, Bluetooth, and LPWAN, to enable
communication between devices.
3. Automation:
Both concepts aim to automate processes, reduce human intervention, and enhance efficiency. They are often used in
industrial settings for tasks like monitoring and control.
4. Remote Monitoring:
Both IoT and M2M are used for remote monitoring and management of assets, such as machinery, vehicles, or infrastructure.
This helps in improving operational efficiency and reducing maintenance costs.
5. Real-time Data:
Both IoT and M2M systems can provide real-time data, allowing for timely decision-making and rapid responses to events or
changes in the environment.
6. Industry Applications:
Both IoT and M2M find applications across various industries, including manufacturing, healthcare, agriculture, logistics, and
smart cities.
7. Sensors and Devices:
Both IoT and M2M rely on sensors and devices to collect data from the physical world. These devices are often designed to
withstand different environmental conditions.